Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community.
Not an ISACA member? Join now!

We often get invites about attending free online webinars on catchy topics like Cyber Security, Data breach prevention, next generation blah blah etc.
I wonder how ofter its really a knowledge transfer (KT) session, and not a hidden sales pitch promot...

This is an interesting blog article summarizing the FBI findings that indicate North Korea was behind the hack and future implications for US corporations:
http://krebsonsecurity.com/2014/12/fbi-north-korea-to-blame-for-sony-hack/

Emergency planning is an important component to ensuring that an organization survives a catastrophic event. Mr. Wlosinski discussed many threats, the emergency framework, and the many plans that are in place to ensure continuity of the federal government. The intended audience includes IT security managers and professionals, federal government managers and directors, contractors, continuity planners, and anyone interested in how the federal government conducts continuity planning.

Information security events that affect cloud systems are occurring with no end in sight, so it should be no surprise that the cloud should be treated as a nonsecure environment with numerous threats and concerns.

In November 2013, the US Office of Management and Budget (OMB) issued memorandum M-14-03 requiring all federal departments and agencies to establish an information security continuous monitoring (ISCM) program.

These links, which have been contributed by site users, link to external third-party web sites. ISACA has not evaluated these web sites and accepts no responsibility for their suitability, security or privacy practices.

NIST kicked off it's Smart Cities challenge to help communities around the world work together to address issues ranging from air quality to traffic management to emergency services coordination. NIST is inviting communities and innovators to create teams that will foster the spread of “smart cities” that take advantage of networked technologies to better manage resources and improve quality of life.

NIST releases Official Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity and the Information Security Forum has mapped it to their annual Standard of Good Practice for IT security professionals.

Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon. Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...

Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term. I caught up with Rob in Australia when he visited Canberra in June 2014...

Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...

Having been associated with the BS 7799 from its introduction as a Security Standard, and as a Contributor to the ISO 27001, and the last and final Chair of the ISO 27001 at the Department of Trade and Industry (DTI) I have been a long term supporter, and...

and Become More Secure
As a penetration tester I find it TOO EASY to fully compromise an internal network – without finding a single “vulnerability”! I spend most of my time on two types of engagements — PCI projects and penetration tests. The pen test...